The world's premier online risk forum for professionals and service providers

A message to all members of GlobalRisk community

Dear GlobalRisk Community member,
We’ve collected really useful resources from the best companies in the world. These include  guides, white papers, webinars and other research. Remember, you only have to enter your information ONCE... after that, just enter your email address and you can download as many as you want. Since some have limited availability, I recommend you download the ones you are interested in immediately. Please let us know what topics are of your most interest and we will deliver them to you. The main sponsors of this issue are SAS and IBM 

_________________________________________________________________________________________
Business Analytics

1. 8 Essentials of Business AnalyticsFind out what business analytics can do for you - and how to get started.Get started with business analytics by taking these eight essential actions.Leading banks use business analytics to predict and prevent credit fraud, saving millions. Retailers use business analytics to predict the best location for stores and how to stock them. Pharmaceutical firms use it to get life-saving drugs to market more quickly. Even sports teams are getting in on the action, using business analytics to determine both game strategy and optimal ticket prices.And you can too. Get started with business analytics by taking these eight essential actions.

http://bit.ly/BusAnalytcs

2. How Organizations Build Success: Analytics and the Bottom Line. Companies are becoming more analytically mature and are developing greater analytical capabilities. Many companies are also creating a context for analytics, with analytical cultures and processes. When companies compete based on analytics, analytics is having a positive bottom-line impact.However, for all its potential, analytics is not yet having a major impact on the quality of corporate decision making. This is the untapped potential: using analytical capabilities, culture, and processes to make better decisions.

http://bit.ly/BusAnalitycsResults

3. Data Mining with Qualitative and Quantitative Data. Learn how organizations are using data mining to solve their problems, including a $1 billion decision that produced positive results.Data mining is past the hype stage and has proven that it can produce significant bottom-line results. This paper discusses the many measurable benefits that data mining delivers, including solving complex needle in the haystack problems, eliminating the bad (such as fraud), pinpointing the good (opportunities), and streamlining decision processes. Learn how organizations are using data mining to solve their problems, including a $1 billion decision that produced positive results.

http://bit.ly/DataMiningStudy

4. Post-Discovery Intelligent Applications - The Next Big Thing. In this paper, well known data management authority Mark Albala proposes replacing the reliance on data models as the fixed navigation scheme used for storing, reporting and analyzing information with a new unified information access capability that enables  more agile, insightful and pro-active decisions.

http://bit.ly/IntelligentApps

5. How Customer Analytics Improve Profitability: Keep and Grow Your Customers. Where and how in the marketing process should you inject analytics to improve profitability? That was the topic of an online Webinar presented by the American Marketing Association (AMA) and SAS.Analytically derived customer insight can really enrich the art of marketing. You get deeper insights about the real sources of customer value, the real impact of marketing costs and the future behavior of customers—all of which can be translated into more effective concept and creative. But where and how in the marketing process should you inject analytics to improve profitability? That was the topic of an online Webinar presented by the American Marketing Association (AMA) and SAS. This paper gives key insights from that Webinar.

http://bit.ly/CusomerAnalyticsReview

6. BI for the SMB 2010: Unlocking Hidden Business Insight to Drive Profit. This paper will outline the value and methods involved in data mining across both quantitative and qualitative data. In addition, it will describe the data transformations necessary before doing such work, and the tools that are particularly valuable for mining mixed data types.Most organizations recognize the danger of relying too heavily on "gut-feel" when it comes to making critical business decisions. As a result these companies increasingly turn to Business Intelligence (BI) tools to provide fact-based insight as a key underpinning of the decision making process. While the traditional paradigm relegated BI to the most technically inclined and well staffed IT organizations at the enterprise level, companies of all sizes are now discovering ways to equip business users with timely and relevant business insight without having to part with the cost, time, and resources typical of traditional enterprise-level BI implementations. As a result of this evolution, top performers within the SMB sector (small to medium sized business, defined as fewer than 1,000 employees) are leveraging BI to capture and transform more mission-critical data into timely business insight, resulting in substantial improvement in top and bottom line performance.

http://bit.ly/AnalyticsSME

7. Mobile BI: Actionable Intelligence for the Agile Enterprise. Aberdeen's Research Benchmarks provide an in-depth and comprehensive look into process, procedure, methodologies, and technologies with best practice identification and actionable recommendations.The global economic downturn may have slowed, but it is not over. Yet in some respects, it appears more of a global restructuring than simply a global slowdown. It has already substantially realigned markets and galvanized economic changes that were nascent before the recession. As a consequence, industry-leading organizations are seeking an advantageous position for the updraft that is expected as the recovery picks up momentum in 2011. Significantly, the Aberdeen Business Review found that 57 percent of companies had seen their customers become more demanding.

http://bit.ly/BIMobile

________________________________________________________________________________________________

HR Compliance:

8. Top 5 HR Compliance Concerns for Small Business. As the economic horizon continues to shift and belts tighten, small and medium sized companies — who typically have between 10 to 500 employees and represent 99.7 percent of all employer firms according to the U.S. Small Business Administration (SBA) — may wind up being so focused on core business issues that they overlook one of their most potentially serious and costly issues — human resource compliance. Unlike their large-company counterparts, they lack the time and resources to build infrastructure and processes that are beyond core business objectives.   But if entrepreneurs and smaller business owners are focused solely on growth and product, how do they know what issues to look for in order to protect the company? This is a must-read paper that discusses th top 5 HR compliance issues they may face. 

http://bit.ly/HRComplianceUSA

9. Linking Learning to Talent Management: The Key to Accelerating Workforce Because no matter how brilliant your business plan is, if you don't have the workforce to support it, you're not going to achieve your intended business results.Talent Management has grown significantly in recent years as more and moreorganizations have recognized the value of aligning workforce planning withbusiness strategy. But talent management strategies and systems can only go so farin assuring the readiness of the workforce to meet ever changing market needs. Astrategy for learning must be linked to talent management to truly accelerate andtransform organizational performance.

http://bit.ly/BestTalentManagement

__________________________________________________________________________________________________

IT Security

10. Reduce IT Costs and Hassles with a Managed Server. Discover the advantages of a managed server and learn what to look for when shopping for a managed private server provider. It’s more critical than ever to have a reliable and robust web solution in place to support increased demand.  But is your dedicated hosting or colocation solution costing too much?  Discover the advantages of a managed server and learn what to look for when shopping for a managed private server provider.

http://bit.ly/ITCosts

11. The Expert Guide to VMware Data Protection and Disaster Recovery. The 3rd chapter of the Expert Guide to VMware Data Protection and Disaster Recovery by Eric Siebert.Virtualization is the most disruptive technology of the decade. Virtualization-enabled data protection and disaster recovery is especially disruptive as it allows IT to do things dramatically better at a fraction of the cost of what it would be in a physical data center. The 3rd chapter of the Expert Guide to VMware Data Protection and Disaster Recovery by Eric Siebert explores the methods and challenges for restoring and verifying data in virtual environments.

http://bit.ly/VMWareDataProtection

12. Justifying IT Security: Managing Risk & Keeping Your Network Secure. This paper discusses the management of Risk and how Vulnerability Management is one of the few counter-measures easily justified by its ability to optimize risk. The goal of a security program is to choose and implement cost effective countermeasures that mitigate the vulnerabilities that will most likely lead to loss. This paper discusses the management of Risk and how Vulnerability Management is one of the few counter-measures easily justified by its ability to optimize risk.

http://bit.ly/ITSecurityRisk

13. The State of Data Security: Defending Against New Risks and Staying Compliant. In this report, you'll learn about what data you need to protect and why, what a data breach will cost your organization and strategies for safeguarding your data. Since 2005, security breaches have compromised more than 500 million US records.  As an IT manager, you must take a look at the risks of potential data loss and create a security plan that helps you stay compliant with data protection rules and regulations. In this report, you’ll learn about what data you need to protect and why, what a data breach will cost your organization and strategies for safeguarding your data.

http://bit.ly/DataSecurityGuide
14. Why Hackers have turned to Malicious JavaScript Attacks. Learn more about this threat, how it works and how cybercriminals make money with these types of attacks.Reaching unsuspecting users through the web is easy and effective and hackers now use sophisticated techniques—like injecting inline JavaScript—to spread malware. Learn more about this threat, how it works and how cybercriminals make money with these types of attacks.

http://bit.ly/JavaHackers
15. Reach for the Top: Selling Data Quality to Senior Executives. This paper tries to help those working in DQ to overcome this problem, and turn senior executives into allies and not blockers of DQ improvement.  It is based on the author’s experience of initiating and leading a major DQ improvement program across a global telecommunications company, and helping other large organizations tackle their DQ issues.

http://bit.ly/DataQualityResearch

16. Cloud Storage: Adoption, Practice, and Deployment. An Outlook Report from Storage Strategies NOW. This study is a comprehensive report on the state of the cloud storage market and of the storage services that are layered atop of it.This study is a comprehensive report on the state of the cloud storage market and of the storage services that are layered atop of it. It includes a definition of cloud storage, discusses how cloud storage is deployed, surveys users on their expectations of the cloud and provides a detailed look at the vendors and services users will deploy in the cloud. Download the abstract for the report here.

http://bit.ly/CloudStorage

17. Building Your Backup and Disaster Recovery Plan. Protecting data is becoming more and more important and new technologies are making backup and recovery strategies more viable to smaller businesses. Now is the time to create an effective BDR plan or review one already in place - before disaster  strikes.

http://bit.ly/DisasterRecoveryPlan

________________________________________________________________________________________________

Banking and insurance.

18. Data Quality for BASEL II. Today financial services institutions must meet the standards for data quality attestation by the FFEIC regulators of risk reporting. This paper discusses the platform and domain expertise needed to support the rigorous demands of commercial and retail risk reporting.Leveraging the solution platform and the risk reporting process templates delivers a combination of fact-based insight, evidence of action and documentation, and business accuracy in support of internal and Federal data audits.

http://bit.ly/BaselIdataquality
19. Where is Your Risk? Insurers must combine information from disparate systems, applications, and business units to create an enterprise view of risk. By developing a process to incorporate geocodes into location intelligence, insurers can build a more accurate assessment of risk.As insurers strive to create an enterprise view of risk, they struggle to combine information from disparate systems, applications, and business units. By developing a strategy and a process that incorporate geocodes into location intelligence, insurers can build a more accurate assessment of their exposure and risk.

http://bit.ly/whereisyourrisk

20. Databases at Risk (based upon a survey of 179 North American security professionals. In a recent Research Brief, ESG analyzed the current state of database security. Based upon a survey of 179 North American-based security professionals working at organizations with over 1,000 employees, ESG found that:Databases house a higher percentage of confidential data than any other type of data repository.Database security depends upon too many manual processes .Enterprise-class organizations aren’t diligent enough about database security. This Research Brief categorizes databases as a “dangerous and growing security gap” – and offers steps to improve database security across the enterprise, such as implementing “database security tools that provide a suite composed of database discovery, vulnerability scanning, penetration testing, user monitoring, logging, encryption, and policy-based enforcement, and using “these tools to automate error prone manual processes and homegrown scripts.”

http://bit.ly/IBMAmerica

21. Finance 2011 | Time to Build the "Last Mile" Whitepaper. The last 20 years have seen great changes in the finance function. Yet many finance teams still spend far too much time on mundane tasks. David Axson, author of The Management Mythbuster, explains how insightful analytics and a systematic approach to risk management can drive dramatic improvements in the quality and value that finance organizations deliver. 

http://bit.ly/IBMRisk


I look forward to your continued participation and feedback!

________________________________________________________________________________________________
Thank you for being here.
Boris Agranovich,
GlobalRisk Community, founder

Visit GlobalRisk community at: http://globalriskcommunity.com/?xg_source=msg_mes_network